Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling

Size: px
Start display at page:

Download "Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling"

Transcription

1 International Journal Of Engineering And Computer Science ISSN: Volume 3 Issue 12 December 2014, Page No Proper Relay Reduction And Route Breakage Prediction In Blueooth Scatternet Scheduling Suganya.K 1, Mrs.A.Nirmala 2 1 M.Phil in MCA dept, Dr.N.G.P.College of Arts and Science Coimbatore,TAMIL NADU, INDIA suganya587.mca@gmail.com 2 Assistant Professor in MCA dept,dr.n.g.p.college of Arts and Science Coimbatore,TAMIL NADU, INDIA nirmalabala30@gmail.com Abstract: Bluetooth is a promising new technology for short range wireless connectivity between mobile devices. By constructing a piconet, Bluetooth device establishes link and communicates with other devices in a master slave manner. The piconets are combined to form the Scatternet and communicate through the Relay /bridge node. So the performance of the Scatternet highly depends on the relays and its degree and mobility. The unnecessary relay causes scheduling overhead and inefficient use of limited resources. Thus, optimum number of relays should be maintained without any control overhead. The proposed method achieves this goal through relay reduction with load balancing and route breakage prediction. Therefore by implementing the proposed protocol the Scatternet performance will get improved due to reduced packet loss and route recovery time. Keywords: Scatternet, Bridge/Relay node, Bridge Scheduling, Relay reduction, Load balancing, Route breakage, Signal Strength 1. INTRODUCTION The wireless technology can be classified as infrastructure and Infrastructure less (Adhoc) network. Bluetooth is an Adhoc networking technology aimed at Low-powered, short range applications. Bluetooth operates in the 2.4 GHz Industrial, Scientific, Medical (ISM) frequency band[9]. It works on the principle of frequency hop spread spectrum (FHSS). There are 79 hop carriers defined for Bluetooth, with 1 MHz spacing, in the ISM band. The basic network of Bluetooth is known as the Piconet. It contains maximum of eight nodes, one master and others are slaves. Each piconet master determines a frequency hopping spreading sequence that the slaves must follow in order to stay synchronized to the piconet channel.. The Time Division Duplex (TDD) frequency hopping (FH) channel is divided into 625μs time slots. A Bluetooth device identifies other devices through their Bluetooth Device Address (BD_Addr) and clock [9]. Initially, Blue- tooth device is in the standby mode and not associated to any device. The master of the piconet performs the inquiry operation to find the new devices within its range by broadcasting the ID packets. Each device enters to inquiry scan (listen to the master) mode to connect the master if it already exists in its range. In the second phase, the page and page scan procedure is used to get the Bluetooth address, clock and device class for synchronization. The master allocates the AM Addr to slave; it range is from 1 to 7 [9]. As connection is then established allowing both the devices to start communication using a Time Division Duplex (TDD) mechanism. The Bluetooth uses the different types of packets like, control (ID, NULL, POLL, FHS), voice (HV1, HV2,HV3, DV), and data (DH1, DH3, DH5, DM1, DM3,DM5) packets. Bluetooth supports 1, 3 and 5 slots packets, each higher slot packet consumes more time as compared to lower slot packet. A master sends packets to in an even-number of slots, while the slave to the master in subsequent slots (odd). If master has no data for slave it sends a POLL packet; and in response if slave also has no data to send to master, it sends a NULL packet to master. A master generally visits all its active slaves in a cycle fashion using a Round-robin scheduling technique [8]. If many devices exist in a co-located area and exceed the limit of piconet, a larger network will be formed that has multiple piconet known as Scatternet. Bluetooth Scatternet has some special characteristics in comparison with general Adhoc networks [5]. In order to communicate between piconets there should be a bridge node that listen both piconet. This shared device is calle as relay. The relay is synchronized to two piconets using the bridge scheduling algorithms [8]. The Scatternet performance highly depends on relay degree, mobility and the number of relays. A relay can only serve one piconet at one time; therefore other piconets communication is blocked. Once the relay has finished its service time in the current piconet, it switches to the next piconet, which causes delay and decreases network performance. This issue is known as an inter-piconet scheduling problem. There have been many protocols developed for inter-piconet communications, but only the two most significant related protocols are considered as basis for the proposed protocol. The relay reduction with disjoint route construction protocol (LORP) [4] reduces the relay without Suganya.K,, IJECS Volume 3 Issue 12 December, 2014 Page No Page 9712

2 considering the traffic load. The dynamic relay management protocol(drm) [2] does the relay reduction with load balancing. But DRM does not consider the node mobility, so the proposed protocol predicts the link disconnection due to mobility and the alternate path is selected before the link disconnection. The prediction is done using the signal strength measurement. 2.RELATED WORKS 2.1. Scatternet Formation and Bridge Scheduling There are different criteria for forming Scatternet and establish general models of Scatternet topologies [5].The different types of Scatternet topologies are: single piconet model, slave/slave mesh, master/slave mesh, tree hierarchy, Master/slave ring and slave/slave ring. The intra-piconet polling schemes and bridge scheduling algorithms are used for Bluetooth Scatternet [8]. The round robin polling scheme is used to poll the slave nodes and ridge scheduling algorithm uses rendezvous points 2.2. Relay Reduction other Bluetooth devices using signal strength readings. The system of my research adopts the threshold value and measuring methods from these papers. 3. ALGORITHMS 3.1.Scatternet Formation The Scatternet is formed through inquiry and paging procedures [1][2]. Initially all Bluetooth devices will be in the standby mode. The nodes enter into the inquiry and inquiry scan mode, in which some node send ID packet and others listens and replys.the node will send inquiry messages. The nodes receiving the inquiry message will send reply to node. After this the nodes will enter to paging procedure. The paging procedure is done for getting the BD-Addr. The node starts the procedure will designate as Master others as slaves. After forming piconets the Scatternet is formed by connecting the piconets through relay nodes. The relay nodes are those nodes which listen to more than one Master. The Fig 1 shows the Scatternet used for the DRM protocol. The relay reduction and disjoint routes construction, LORP protocol [4] present an effective protocol that can dynamically adjust the network topology by reducing the unnecessary relays. In a Scatternet, each relay r sends therelay Information Collection (RIC) message to each of its masters. On receiving the RIC message, master mi collects information of relays belonging to piconet Pi and the connection information of neighboring masters. Once the relay r receives the information provided by the masters the relay connects to, each relay creates a Connection Table (CT). After the CT is constructed, each relay examines the CT and determines whether to change the role from a relay to a pure slave. Reducing the number of relays not only decreases the guard time cost for relay switching among piconets, but also reduces the probability of packet loss and improves the t ansmission efficiency. The relay nodes update the CT in the following two situations. First, the relay nodes use the received polling messages from masters to check the link validity and update the CT. Second, the relay node updates the CT table when routes create new links. The relay reduction is done on higher degree relays, relays with same degree are not considered. The reduction is done without considering the traffic load so congestion occurs by reducing the high traffic relay. These drawbacks have been rectified in the proposed system 2.3.Signal Strength and Route Breakage Prediction The Route Breakage Prediction (RBP) Protocol [6] for Bluetooth network predicts the route breakage on the basis of signal strength before the link breaks.this protocol overcomes the problem of data packet loss and the problem of delay. But this protocol does not perform the Relay management on the basis of traffic load. To find the positions of the Bluetooth devices different metrics are used, such as the RSSI (Received Signal Strength Indicator), time difference etc [7]. The Bluetooth Triangulator [1] explains an experiment combining hardware and software design to allow Bluetooth devices to communicate with each other and determine the Position of Fig 1: Illustration of Scatternet 3.2.Relay Connection Table Construction After the connection establishment each relay sends its information including battery power, number of connection etc to connected masters [2]. The master constructs the relay connection table using this information. This RCT table is used to find the degree and the remaining battery power for Relay Reduction. 3.3.Inter Piconet Routing In this, the node wants to send data will communicate to its Master.The Master will send route request packet and the route reply will come in the reverse path of the request [4]. Then the data packets are send between nodes through the discovered path using the relay nodes Relay Reduction Suganya.K,, IJECS Volume 3 Issue 12 December, 2014 Page No Page 9713

3 The unnecessary relays are reduced on the basis of the relay degree and remaining battery power [2]. The relay node which is high in degree will remain as active relay and the low degree relays will change to backup relay and if same degree relay, the node with minimum battery power will designate as backup relay. The relays are selected without disconnecting the existing Scatternet. Algorithm: Relay reduction procedure[2] Input: Relay Connection table Output: Defines Relay Role 1. for each relay i in row do 2. if subset (row i,row i+1 ) then 3. if degree(row i )<degree(row i+1) or (degree(row i )= degree(row i+1)) and R_power(row i )<R_power(row i+1 ) then 4. chang_role_rct(row i )=BR 5. if Ri (P_Id)!=M(P_Id) then 6. disconnect (Ri ) 7. endif 8 else 9. chang_role_rct(row i+1 )=BR 10. if Ri+1 (P_Id)!=M(P_Id) then 11. disconnect (Ri+1 ) 12. endif 13. endif 14 endif 15 end for each 3.5. Load Balancing After relay reduction if any congestion occurs then the master will go for load balancing. The threshold delay is set. If the delay is increased beyond the threshold value the backup relays are switched to active relay to share the load through role_switch operation [2]. The total link load TLL, which is the sum of incoming and outing traffic, can be calculated through the equation [3]. n + a1 j a1i j 1 n i 1 = TLL for i& j=1,2, n where n<8 (1) Delay in a Scatternet highly depends on the relay degree (RD) and traffic load. The relay activation time depends on the bridging algorithm that is further divided into two times, synchronization time and service time. Therefore, the total link delay (TLD) can be calculated through Equation [3]: TLD=RD*(Synchronization_Time+Service_Time) +TLL (2) The master checks the traffic load of each relay in the piconet through the Decision Maker function (DM). The DM compares the TLD with θ, the threshold value.the θ value is fixed and it is analyzed that θ = 1.5 s gives optimum results [8]. If the TLD is greater than θ the master searches for a backup relay. The below given algorithm is used for the backup relay Algorithm: Dynamic load balancing[2] Input: Relay Connection table Output: Find backup relay to share load 1. for each relay i in row do 2. if subset(rowi, R) and BR=Null then 3. BR=Idi 4. else if subset(rowi, BR) and RD(BR)<RD(rowi ) then 5. BR=Idi 6. end if 7. end for each 8. if BR!=Null then 9Connection(role_switch_req(BR),role_switch_r eqneighbor_master)) 10 while Transmission() 11Disconnect(role_switch_req(BR),role_switch_ req(neighbor_master)) 12 end if Analytically, the DRM has reduced relay-reduction overhead [9]. But this system was not addressed the relay node mobility that will cause frequent link disconnection. So in order to avoid this prediction method is used 4. METHODOLOGIES 4.1. Dynamic Relay Management The Dynamic relay management in this system is done through the DRM protocol. The Scatternet is formed through Inquiry and Paging procedure. After connection establishment the Relay Connection table is formed. Then by monitoring the traffic load the Master node will go for Relay reduction or load balancing Route Breakage Prediction The link disconnection occurs in Scatternet mainly due the relay node mobility. This will degrade the performance of the Scatternet through packet loss and delay for Route recovery. So in order to avoid this prediction approach is employed [6]. The signal strength between the relay node and the connected master node is measured. If the signal strength is reducing beyond the threshold value, then the particular relay is replaced with a backup or a slave node within the rage of the master nodes through role switching operation. Thus the route recovery time will reduce and the packet loss will also get reduced due to this method. Suganya.K,, IJECS Volume 3 Issue 12 December, 2014 Page No Page 9714

4 The alternate path is selected for backup relays, if there exists backup relays to replace the weak link. If more than one backup relays exists the master will select the relay with higher degree and higher remaining battery power. If there are no backup relays, the master will perform the role switch operation among its slaves. The slave which is within the communication range of the corresponding piconets, which is within 30m, that node is selected as the relay. So the further communication is done through the new relay. Thus the route breakage can be predicted using this method. 5. SIMULATION MODEL AND PERFORMANCE EVALUATION The system is simulated on UCBT (University of Cincinnati BlueTooth) a Bluetooth extension to NS2.This simulator implements Bluetooth in great details. The connected Scatternet with 25 Bluetooth nodes are created. Nodes are randomly deployed in an area of 100m*100m and the radio range for the Bluetooth node is taken as 30 m.the Scatternet contains five piconets. The Fig 3 shows the Scatternet formed. The Nodes are in the initial state. Then the Master is selected and then it will send request to the other nodes. If a node receives request from more than one Master then it will act as bridge between the piconets. The constant bit rate traffic model is used. To evaluate the performance the packet loss and route recovery time is considered. 6.CONCLUSION Fig 3: Relay Connection Table Entries In Adhoc networks, the link disconnection occurs due to node mobility. In Bluetooth Scatternet the relay node degree and mobility affects the Scatternet performance. The relay node mobility causes link disconnection. The existing system does relay management without considering the relay node mobility. Hence the system overcomes the drawback by predicting the route breakage. Thus this system will improve the Scatternet efficiency through reducing the packet loss and route rediscovery time. 7. ACKNOWLEDGEMENT I would like to express my deep sense of gratitude with sincerity to my guide Mrs. A.Nirmala, Assistant Professor, Department of Computer Applications, who provided her valuable suggestions and precious time in accomplishing this paper. I thank all those who had contributed directly and indirectly towards the success of my research. Fig 2: Scatternet Formation The Fig 3 shows the RCT entries for the Node 7, which is a Master node. The entries are the bridge node listening to the Master, its remaining battery power and the total number of connections for each relay node. From this we are estimating the degree of relays and this information is used in Relay Reduction. The same table is used for selecting the backup relay whenever congestion occurs. The Relay table will be modified by adding the signal strength measure of Relay nodes in order to predict the Rout Breakage REFERENCES [1] Almaula, V. ;Cheng, D.(2006): Bluetooth triangulator.technical report: Department of Computer Science and Engineering, University of California, San Diego. [2] Bakhsh, S.T.;Hasbullah,H. ; Tahir,S.(2012) : Dynamic relay management protocol for efficient interpiconet scheduling in Bluetooth scatternet.journal of Computer and Electrical Engineering,Vol.38,pp [3] Bakhsh,S.T.;Hasbullah,H. ;Tahir,S.(2011): Dynamic Congestion Control through backup relay in Bluetooth Scatternet.Journal of Network and Computer Applications,Vol.34,pp [4] Jong, Y.G.; Yung, C.C.;Ping, S.K. ; Chieh, L.S.(2007): Relay reduction and disjoint routes construction for scatternet over Bluetooth radio system.j Network Comput Appl, Vol.30, pp [5] Persson, K.E.; Manivannan,D.; Singhal, M. (2005): Bluetooth Scatternets: criteria, models and classification. Ad Hoc Networks, Vol.3, pp Suganya.K,, IJECS Volume 3 Issue 12 December, 2014 Page No Page 9715

5 [6] Tahir, S. ; Said, A.M. (2012): Route Breakage Prediction Protocol for Bluetooth Network Recovery.Latest Advances in Information Science and Applications, Vol.3, pp: [7] Thapa, K.; Case, S. (2003): An Indoor Positioning Service for Bluetooth Ad Hoc Networks.Midwest Instruction and Computing, Duluth, MN, USA. [8] Vojislav, B.;Misic, J. (2003): Polling and bridge scheduling algorithms in Bluetooth. Technical report TR 03/04, Manitoba, Canada R3T 2N2: Department of Computer Science, University of Manitoba Winnipeg. [9] Whitaker, R.M.; Hodge, L.;Chlamtac, I. (2005) : Bluetooth Scatternet formation: a survey.ad hoc Networks,Vol.3,pp Suganya.K,, IJECS Volume 3 Issue 12 December, 2014 Page No Page 9716

Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet

Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet Link Repairing for Inter-Piconet Communication Technique in Bluetooth Scatternet Sabeen Tahir, Abas Md Said, and Sheikh Tahir Bakhsh Abstract A mobile ad-hoc network (MANET) is a collection of wireless

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface Inside Bluetooth Application Host Application Host Audio (SCO) RFCOMM SDP Data (ACL) Control API and Legacy Support Modules Bluetooth HCI Driver Transport Interface Physical I/F Transport Bus Bluetooth

More information

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems

BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems J. Parallel Distrib. Comput. 66 (2006) 1243 1258 www.elsevier.com/locate/jpdc BlueCube: Constructing a hypercube parallel computing and communication environment over Bluetooth radio systems Chao-Tsun

More information

e-pg Pathshala Quadrant 1 e-text

e-pg Pathshala Quadrant 1 e-text e-pg Pathshala Subject : Computer Science Module: Bluetooth Paper: Computer Networks Module No: CS/CN/37 Quadrant 1 e-text In our journey on networks, we are now exploring wireless networks. We looked

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Bluetooth, PhD Assistant Professor DCS Research Group Based on slides previously done by Matti Siekkinen, reused with permission For classroom use only,

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 6 IEEE 802.15.1 - Bluetooth Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 The 802.15 Family Target environment: communication of personal

More information

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology

On The Method and Performance Evaluation of A Hybrid Mesh-Tree Topology Appl. Math. Inf. Sci. 6. 2S pp. 547S-551S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. On The Method and Performance Evaluation

More information

Amarjeet Singh. February 7, 2012

Amarjeet Singh. February 7, 2012 Amarjeet Singh February 7, 2012 References Bluetooth Protocol Architecture v.1 www.bluetooth.org http://www.tutorial-reports.com/wireless/bluetooth/ Slides from last class uploaded on the course website

More information

Securing A Bluetooth Device

Securing A Bluetooth Device Securing A Bluetooth Device Mrs. Dhanashri D. Dhokate 1, Mr. Milind C. Butale 2, Mr. Babasaheb S. Patil 3 Assistant Professor, Information Technology, PVPIT, Budhgaon, India 1. Associate Professor, Electronics

More information

Bluetooth: Short-range Wireless Communication

Bluetooth: Short-range Wireless Communication Bluetooth: Short-range Wireless Communication Wide variety of handheld devices Smartphone, palmtop, laptop Need compatible data communication interface Complicated cable/config. problem Short range wireless

More information

Sensor Application for Museum Guidance

Sensor Application for Museum Guidance Sensor Application for Museum Guidance Radka Dimitrova a a TU,Dresden, Germany, e-mail: dimitrova@ifn.et.tu-dresden.de Abstract - This article examines the conditions for successful communication and power

More information

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore.

UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Communication Switching Techniques UNIT 5 P.M.Arun Kumar, Assistant Professor, Department of IT, Sri Krishna College of Engineering and Technology, Coimbatore. Bluetooth Techniques References 1. Wireless

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Vol:1, No:3, 27 Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference Radosveta Sokullu and Engin Karatepe International Science Index, Electrical and Computer Engineering

More information

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15 Lecture 23 Overview Last Lecture ADSL, ATM This Lecture Wireless Technologies (1) Wireless LAN, CSMA/CA, Bluetooth Source: chapters 6.2, 15 Next Lecture Wireless Technologies (2) Source: chapter 16, 19.3

More information

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices Stefano Basagni Dept. of Electrical and Computer Engineering Northeastern University E-mail: basagni@ece.neu.edu Chiara Petrioli

More information

Communication Systems. WPAN: Bluetooth. Page 1

Communication Systems. WPAN: Bluetooth. Page 1 Communication Systems WPAN: Bluetooth Page 1 Outline Historical perspective Piconet Scatternet Lattency modes Applications Page 2 Bluetooth Bluetooth (BT) wireless technology is a short-range communications

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

Bluetooth Demystified

Bluetooth Demystified Bluetooth Demystified S-72.4210 Postgraduate Course in Radio Communications Er Liu liuer@cc.hut.fi -10 Content Outline Bluetooth History Bluetooth Market and Applications Bluetooth Protocol Stacks Radio

More information

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1. Physical LAN segment q Hosts connected on the same physical LAN segment q Same subnet; L2 forwarding q ARP (IPè MAC) L2 frame (S, D), send q Scale? Extending or Interconnecting LANS q q q Why not just

More information

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network Hemali Kotak 1, Hiteishi Diwanji 2 1 A.V.P.T.I. /Comp. Deptt, RAJKOT,INDIA Email: Hemali@yahoo.com 2 L.D. ENGG. College/Comp.

More information

WIRELESS TECHNOLOGIES

WIRELESS TECHNOLOGIES WIRELESS TECHNOLOGIES Bluetooth, ZigBee and ANT Thomas Aasebø OVERVIEW What are wireless sensor networks? What are personal area networks? What are these networks typically used for? Bluetooth, ZigBee

More information

Research on Modern Bluetooth Technology

Research on Modern Bluetooth Technology Research on Modern Bluetooth Technology D.Annal 1, T.Indira 2, K.Poojitha 3, R.Rajashree 4 Student, Dept. of CSE, Magna College of Engineering, Chennai, Tamil Nadu, India 1,2,3,4 ABSTRACT: The seemingly

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL BLUETOOTH Amita Tiwari IIIrd Semester amitaasct@gmail.com Sunil Kumar IIIrd Semester sunilasct@gmail.com ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL ABSTRACT Blue tooth is a standard developed by a group

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth CS4/MSc Computer Networking Lecture 13: Personal Area Networks Bluetooth Computer Networking, Copyright University of Edinburgh 2005 BlueTooth Low cost wireless connectivity for Personal Area Networks

More information

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. WPAN: Bluetooth MOBILE COMPUTING Jan-May,2012 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com EM Spectrum ISM band 902 928 Mhz 2.4 2.4835 Ghz 5.725 5.85 Ghz LF MF

More information

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks

TPSF+: A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks : A New Two-Phase Scatternet Formation Algorithm for Bluetooth Ad Hoc Networks Chu Zhang, Vincent W.S. Wong, and Victor C.M. Leung Department of Electrical and Computer Engineering The University of British

More information

Bluetooth. Bluetooth Radio

Bluetooth. Bluetooth Radio Bluetooth Bluetooth is an open wireless protocol stack for low-power, short-range wireless data communications between fixed and mobile devices, and can be used to create Personal Area Networks (PANs).

More information

CHAPTER 3 BLUETOOTH AND IEEE

CHAPTER 3 BLUETOOTH AND IEEE CHAPTER 3 BLUETOOTH AND IEEE 802.15 These slides are made available to faculty in PowerPoint form. Slides can be freely added, modified, and deleted to suit student needs. They represent substantial work

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

System Level Analysis of the Bluetooth standard

System Level Analysis of the Bluetooth standard System Level Analysis of the standard Massimo Conti, Daniele Moretti Università Politecnica delle Marche, via Brecce Bianche, I-60131, Ancona, Italy Abstract The SystemC modules of the Link Manager Layer

More information

A Dynamic Interference-Avoidance Algorithm for Frequency Hopping Systems

A Dynamic Interference-Avoidance Algorithm for Frequency Hopping Systems 7 JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL. 5, NO. 2, JUNE 2009 A Dynamic Interference-Avoidance Algorithm for Frequency Hopping Systems Ivo Stojan Original scientific paper Abstract: In this

More information

An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks

An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks An Adaptive Scheduling Algorithm for Bluetooth Ad-hoc Networks Raymond Y.L. Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,Vancouver, BC,

More information

Guide to Wireless Communications, 3 rd Edition. Objectives

Guide to Wireless Communications, 3 rd Edition. Objectives Guide to Wireless Communications, 3 rd Edition Chapter 5 Wireless Personal Area Networks Objectives Describe a wireless personal area network (WPAN) List the different WPAN standards and their applications

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

BLUETOOTH PAN and external IP networks

BLUETOOTH PAN and external IP networks BLUETOOTH PAN and external IP networks 1 Tore E. ]j1jnvik, 2Paal Engelstad & 2 Do van Thanh 1. Unik - University of Oslo - Norway - tlf: +47 90199176 - torejoen@iji.uio.no 2. Telenor R&D - Norway - tif:

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS M. Subramani and M. Ilyas College of Engineering Florida Atlantic University Boca Raton, Florida 33431 {msubrama@cse.fau.edu, ilyas@fau.edu} Abstract Many

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 6: Bluetooth and 802.15.4 October 12, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Bluetooth Standard for Personal Area

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks

A Two-Phase Scatternet Formation Protocol for Bluetooth Wireless Personal Area Networks A Two-hase Scatternet Formation rotocol for luetooth Wireless ersonal Area Networks Yoji Kawamoto 1, Vincent W.S. Wong 2, and Victor C.. Leung 2 1 Network & Software Technology Center, Sony Corporation,

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea

MOBILE COMPUTING. Bluetooth 9/20/15. CSE 40814/60814 Fall Basic idea OBILE COUTING CE 40814/60814 Fall 2015 Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement

More information

Introduction to Wireless Networking ECE 401WN Spring 2009

Introduction to Wireless Networking ECE 401WN Spring 2009 I. Overview of Bluetooth Introduction to Wireless Networking ECE 401WN Spring 2009 Lecture 6: Bluetooth and IEEE 802.15 Chapter 15 Bluetooth and IEEE 802.15 What is Bluetooth? An always-on, short-range

More information

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India Indirect Mobile Data Transfer Under Bluetooth Protocol 1 Pramod Kumar Maurya, 2 Gireesh Dixit, 3 Jay Prakash Maurya 1 M.Tech Scholor, 2 HOD, Department Of Computer Science, MPM, Bhopal, Bhopal, 462021,

More information

GPS based Bluetooth Broadcasting Long Range Solution

GPS based Bluetooth Broadcasting Long Range Solution GPS based Bluetooth Broadcasting Long Range Solution Khaja Kamaluddin 1, Masood Shareef Arif 2, Imran Khan 3 Department of Computer Science Sirte University, Libya E-mail: k_khaja@yahoo.com 1, msarif_mca@yahoo.com

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

WIRELESS SENSOR NETWORK

WIRELESS SENSOR NETWORK 1 WIRELESS SENSOR NETWORK Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of Technology Roorkee)

More information

Wireless networks. Wireless Network Taxonomy

Wireless networks. Wireless Network Taxonomy Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher

More information

Bluetooth. Basic idea

Bluetooth. Basic idea Bluetooth Basic idea Universal radio interface for ad-hoc wireless connectivity Interconnecting computer and peripherals, handheld devices, DAs, cell phones replacement of IrDA Embedded in other devices,

More information

A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS

A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS University of Kentucky UKnowledge University of Kentucky Doctoral Dissertations Graduate School 2009 A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS Karl E. Persson University of Kentucky, karl@cs.uky.edu

More information

Bluetooth Time Division Duplex - Exact Analysis as a Polling System

Bluetooth Time Division Duplex - Exact Analysis as a Polling System CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of

More information

NETWORK FORMATION AND ROUTING FOR MULTI HOP WIRELESS AD HOC NETWORKS

NETWORK FORMATION AND ROUTING FOR MULTI HOP WIRELESS AD HOC NETWORKS NETWORK FORMATION AND ROUTING FOR MULTI HOP WIRELESS AD HOC NETWORKS A Dissertation Presented to The Academic Faculty By Xin Zhang In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy

More information

Wireless LANs/data networks

Wireless LANs/data networks RADIO SYSTEMS - ETIN15 Lecture no: 12 Wireless LANs/data networks Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-05-03 Ove Edfors - ETIN15 1 Centralized and

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the Bluetooth technology, developed by Ericsson Mobile Communications, a worldwide telecommunications company based in Sweden, is fast becoming the worldwide standard for short-range wireless communication.

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

A location-aware multicasting protocol for Bluetooth Location Networks

A location-aware multicasting protocol for Bluetooth Location Networks Information Sciences 177 (2007) 3161 3177 www.elsevier.com/locate/ins A location-aware multicasting protocol for Bluetooth Location Networks Chih-Yung Chang a, *, Kuei-Ping Shih a, Chung-Hsien Hsu b, Hung-Chang

More information

Spectrum Management in Cognitive Radio Networks

Spectrum Management in Cognitive Radio Networks Spectrum Management in Cognitive Radio Networks Jul 14,2010 Instructor: professor m.j omidi 1/60 BY : MOZHDEH MOLA & ZAHRA ALAVIKIA Contents Overview: Cognitive Radio Spectrum Sensing Spectrum Decision

More information

PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin

PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin Bluetooth solution PCs Closed! Cell Phones Off! Marketing Assistant Manager - Magic Lin 林 lin.magic@tw.anritsu.com 0933-710-634 v.9 群 1 Bluetooth Core System Architecture 2 Bluetooth Core System Architecture_2

More information

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09 Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism Yun-Ming, Chiu 2005/6/09 Outline Overview Survey of Bluetooth Structure of Bluetooth

More information

CSC 4900 Computer Networks: Wireless Networks

CSC 4900 Computer Networks: Wireless Networks CSC 4900 Computer Networks: Wireless Networks Professor Henry Carter Fall 2017 Last Time Mobile applications are taking off! What about current platforms is fueling this? How are an application s permission

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Local Recovery of Routes for Reliability using Backup Nodes in MANETs Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The

More information

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach Topic 2b Wireless MAC Chapter 7 Wireless and Mobile Networks Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 7-1 Ch. 7: Background: # wireless

More information

Capacity Assignment in Bluetooth Scatternets Optimal and Heuristic Algorithms

Capacity Assignment in Bluetooth Scatternets Optimal and Heuristic Algorithms Capacity Assignment in Bluetooth Scatternets Optimal and Heuristic Algorithms Gil Zussman and Adrian Segall Department of Electrical Engineering Technion Israel Institute of Technology Haifa 32000, Israel

More information

Subject Data Communication. Subject Code 15CS46. Module 2 (Part 2) Multiplexing and Switching

Subject Data Communication. Subject Code 15CS46. Module 2 (Part 2) Multiplexing and Switching 1. What is multiplexing? What are types of multiplexing? (Dec 2012) Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. If the

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

101seminartopics.com. Bluetooth Based Smart Sensor Networks

101seminartopics.com. Bluetooth Based Smart Sensor Networks Bluetooth Based Smart Sensor Networks ABSTRACT Dragging the world towards wireless galaxy Various sensors are already in a broad use today as part of different devices or as standalone devices connected

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Bluetooth. March 28, 2005 Patrick Lui

Bluetooth. March 28, 2005 Patrick Lui Bluetooth March 28, 2005 Patrick Lui 0053252 1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Simulation of Bluetooth Network

Simulation of Bluetooth Network Simulation of Bluetooth Network Lennart Lagerstedt Stockholm, 2003 Master of Science Thesis Project The Department of Microelectronics and Information Technology, Royal Institute of Technology (KTH) Lennart

More information

A Guide. Wireless Network Library Bluetooth

A Guide. Wireless Network Library Bluetooth A Guide to the Wireless Network Library Conforming to Standard v1.1 SystemView by ELANIX Copyright 1994-2005, Eagleware Corporation All rights reserved. Eagleware-Elanix Corporation 3585 Engineering Drive,

More information

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management

More information

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 6 High Rate Wireless Personal Area Networks Objectives Define a high rate wireless personal area network (HR WPAN) List the different HR WPAN standards

More information

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802. Wireless LANs The 802.11 Protocol Stack The 802.11 Physical Layer The 802.11 MAC Sublayer Protocol The 802.11 Frame Structure Services 56 802.11 The 802.11 Working Group The IEEE 802.11 was formed in July

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

Improving Simultaneous Voice and Data Performance in Bluetooth Systems

Improving Simultaneous Voice and Data Performance in Bluetooth Systems Improving Simultaneous Voice and Data Performance in Bluetooth Systems Abstract In the Bluetooth system, isochronous applications, such as voice and audio, are carried by Synchronous Connection Oriented

More information

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 / Traffic with Efficient Bluetooth Technology Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3 1,3 National University of Sciences and Technology (NUST), Pakistan 2 University of Bradford, Bradford,

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS 3 WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS Dr. H. K. Verma Distinguished Professor (EEE) Sharda University, Greater Noida (Formerly: Deputy Director and Professor of Instrumentation Indian Institute of

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #7: Medium Access Control WPAN, Bluetooth, ZigBee Tamer Nadeem Dept. of Computer Science Bluetooth Page 2 Spring 2013 CS 795/895 - Wireless Networked

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information